DEF CON 18 - How I Met Your Girlfriend

Rating :

Comments

dmoravalat March 18,2015Every time we heard the word hacking we instantly think about software, apps. However, hardware can be hacked too. Indeed, the first hacks had been done in telephone circuits. This video shows you how appliance can be hack. For instance, firewall, ISD, Encryption system, or a hotel thermostat. Basic steps are get device target, open source info, and attack vector. Attack methods could be voltage glitching, timing manipulation, fuse resetting, debug path manipulation. Very nice video .............

nbodykat April 18,2015I agree. When most people think of hacking their picturing the person sitting in front of a computer hacking into software systems. People tend to forget that hardware can be hacked into as well and they may not necessarily take precautions to protect their hardware. I will agree beer good, fire bad as a fellow beer lover.

DPerryat April 25,2015Its funny they mention look for people being lazy; that was nearly the prime topic of a 4 hour teleconference I was on last week. The overall purpose was cyber security; but as secure as your building / network / computer / phone may be, it will always fall under the weakness of humanity.

mariawhit8at April 26,2015Love the Defcon videos since I've never been. Good article on attacking the very hardware design for protection. Hardware hacking isn't widely discussed and I'm shocked at how cheaply it can be accomplished. Even though the steps are somewhat repeatable it does not seem simple analyzing circuits and modifying based on device type.

gmazurat April 28,2015Security conferences always seem to cover interesting hardware hacks, they are always impressive, deal with a typical protocols you've never heard of. However, on the flip side, in order to complete these types hacks, typically you need physical access and a lot of time.